Unit8ComputerEthicsPPT课件

上传人:新** 文档编号:573283682 上传时间:2024-08-14 格式:PPT 页数:17 大小:108.50KB
返回 下载 相关 举报
Unit8ComputerEthicsPPT课件_第1页
第1页 / 共17页
Unit8ComputerEthicsPPT课件_第2页
第2页 / 共17页
Unit8ComputerEthicsPPT课件_第3页
第3页 / 共17页
Unit8ComputerEthicsPPT课件_第4页
第4页 / 共17页
Unit8ComputerEthicsPPT课件_第5页
第5页 / 共17页
点击查看更多>>
资源描述

《Unit8ComputerEthicsPPT课件》由会员分享,可在线阅读,更多相关《Unit8ComputerEthicsPPT课件(17页珍藏版)》请在金锄头文库上搜索。

1、Unit 8 Computer Ethics1Words relatedhack into hacker database credit card apply to ethically/legallyIT: information technology ethical boundary snoop privacy social consequence be respectful of negative message gain access to download/copy/quote plagiarismsoftware enforce/utilize the rules develop a

2、 strong sense of principle boil down to appropriate curriculum23Background InformationSearching for Ethics in the Global Village becomes more prevalent, computer ethics becomes more difficult and more important.4Computer ethics has two parts: 1.the analysis of the nature and social impact of compute

3、r technology1.the corresponding formulation and justification of policies for the ethical use of such technology. I use the phrase “computer technology” because I take the subject-matter of the field broadly to include computers and associated technology, including software, hard- ware, and networks

4、 5Ethics is the question of right and wrong. We are taught from a young age that plagiarism (copying otherswork) is wrong. One might say, it is like cheating on a test when you burn a CD copy of someone elses music or game. However, most people dont associate copying of songs, games, videos, etc. as

5、 being wrong. Just because it is easy and hard to get caught does not make it right. The rights of the creator must be protected if we are going to be a society that is creative and inventive.6Lets see this as a personal issue.If you let a person borrow your email password or locker combination and

6、they share some personal information found in your locker or email with others, without your knowledge, you probably would feel violated and very hurt. Now think of a song writers feeling when an artist performs their song without permission. One step further, you copy that MP3 song from a friend bu

7、t do not pay for it. It is a copyright violation to take an artists songs and sharing it with your friends without them having to pay for it.7Computer Ethics is a branch of practical philosophy which deals with how computing professionals should make decisions regarding professional and social condu

8、ct.8Margaret Anne Pierce, a professor in the Department of Mathematics and Computers at Georgia Southern University has categorized the ethical decisions related to computer technology and usage into 3 primary influences:91. The individuals own personal code.2. any informal code of ethical behavior

9、that exists in the work place.3. exposure to formal codes of ethics10Internet Privacy Internet Privacy is one of the key issues that has emerged since the evolution of the world wide web. Millions of internet users often expose personal information on the internet in order to sign up or register for

10、 thousands of different possible things. 11Copyright infringementcopyright infringement is a critical issue on the internet. The widespread availability to upload or download files and data has given open road to almost anyone to access popular content that may otherwise needed to be purchased for m

11、oney. However, with piracy and just peer-to-peer friendly file transfers, many copyright acts have been violated on the internet. How does one address that issue when files are being sent worldwide, from anyone to everyone and back. Do you punish everyone? That is just not possible. This is a critic

12、al problem that dwells on ones own restraint or ethics to decide what is best for them.12Internet ControlWith an explosion of internet popularity, the power struggles of the world have easily transferred onto the internet. Independent users, businesses, search engines, any possible source of informa

13、tion is trying to control, manipulate, bias, censor their information on the internet whether they realize it or not. 13Computer Reliability14Questions1.What is Ethics?a.Is it ethical to steal from a store?b.Is it ethical to open an envelope and read a letter to someone else?2.What is computer ethic

14、s?3. Information about Computer Ethics Institute? When? The goal?15TEN COMMANDMENTS OF COMPUTER ETHICS- BY COMPUTER ETHICS INSTITUTE 1.Thou shalt not use a computer to harm other people.2.Thou shalt not interfere with other peoples computer work.3.Thou shalt not snoop around in other peoples compute

15、r files.4.Thou shalt not use a computer to steal.5.Thou shalt not use a computer to bear false witness. 166.Thou shalt not copy or use proprietary software for which you have not paid.7.Thou shalt not use other peoples computer resources without authorization or proper compensation.8.Thou shalt not

16、appropriate other peoples intellectual output.9.Thou shalt think about the social consequences of the program you are writing or the system you are designing.10.Thou shalt always use a computer in ways that ensure consideration and respect for your fellow humans.(Thou means you; Shalt means shall; just the same as in Bible)17

展开阅读全文
相关资源
正为您匹配相似的精品文档
相关搜索

最新文档


当前位置:首页 > 办公文档 > 工作计划

电脑版 |金锄头文库版权所有
经营许可证:蜀ICP备13022795号 | 川公网安备 51140202000112号